Page 5 of 392 results (0.007 seconds)

CVSS: 9.3EPSS: 62%CPEs: 6EXPL: 0

Microsoft Internet Explorer 6 through 11 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "Internet Explorer Memory Corruption Vulnerability," a different vulnerability than CVE-2015-1666. Microsoft Internet Explorer 6 hasta 11 permite a atacantes remotos ejecutar código arbitrario o causar una denegación de servicio (corrupción de memoria) a través de un sitio web manipulado, también conocido como 'vulnerabilidad de la corrupción de memoria de Internet Explorer,' una vulnerabilidad diferente a CVE-2015-1666. This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Microsoft Internet Explorer. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the handling of CDocument objects. By manipulating a document's elements an attacker can force a dangling pointer to be reused after it has been freed. • http://www.securityfocus.com/bid/73990 http://www.securitytracker.com/id/1032108 https://docs.microsoft.com/en-us/security-updates/securitybulletins/2015/ms15-032 • CWE-399: Resource Management Errors •

CVSS: 6.8EPSS: 1%CPEs: 6EXPL: 0

Microsoft Internet Explorer 6 through 11 allows remote attackers to bypass the ASLR protection mechanism via a crafted web site, aka "Internet Explorer ASLR Bypass Vulnerability." Microsoft Internet Explorer 6 hasta 11 permite a atacantes remotos evadir el mecanismo de protección ASLR a través de un sitio web manipulado, también conocido como 'vulnerabilidad de la evasión de ASLR de Internet Explorer.' This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Microsoft Internet Explorer. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the CAutoRange::GetRangeTopLeft function. By manipulating a document's elements an attacker can force a type confusion error. • http://www.securityfocus.com/bid/74006 http://www.securitytracker.com/id/1032108 https://docs.microsoft.com/en-us/security-updates/securitybulletins/2015/ms15-032 • CWE-264: Permissions, Privileges, and Access Controls •

CVSS: 9.3EPSS: 21%CPEs: 6EXPL: 0

Microsoft Internet Explorer 6 through 11 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "Internet Explorer Memory Corruption Vulnerability," a different vulnerability than CVE-2015-1652. Microsoft Internet Explorer 6 hasta 11 permite a atacantes remotos ejecutar código arbitrario o causar una denegación de servicio (corrupción de memoria) a través de un sitio web manipulado, también conocido como 'vulnerabilidad de la corrupción de memoria de Internet Explorer Memory,' una vulnerabilidad diferente a CVE-2015-1652. This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Microsoft Internet Explorer. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The vulnerability relates to how Internet Explorer processes the HTML meta elements. By manipulating a document's elements an attacker can force a CMetaElement object in memory to be reused after it has been freed. • http://www.securitytracker.com/id/1032108 https://docs.microsoft.com/en-us/security-updates/securitybulletins/2015/ms15-032 • CWE-399: Resource Management Errors •

CVSS: 9.3EPSS: 23%CPEs: 6EXPL: 0

Microsoft Internet Explorer 6 through 11 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "Internet Explorer Memory Corruption Vulnerability," a different vulnerability than CVE-2015-1634. Microsoft Internet Explorer 6 hasta 11 permite a atacantes remotos ejecutar código arbitrario o causar una denegación de servicio (corrupción de memoria) a través de un sitio web manipulado, también conocido como 'vulnerabilidad de la corrupción de memoria de Internet Explorer,' una vulnerabilidad diferente a CVE-2015-1634. • http://www.securityfocus.com/bid/72923 http://www.securitytracker.com/id/1031888 https://docs.microsoft.com/en-us/security-updates/securitybulletins/2015/ms15-018 • CWE-399: Resource Management Errors •

CVSS: 9.3EPSS: 52%CPEs: 6EXPL: 0

Microsoft Internet Explorer 6 through 11 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "Internet Explorer Memory Corruption Vulnerability," a different vulnerability than CVE-2015-1625. Microsoft Internet Explorer 6 hasta 11 permite a atacantes remotos ejecutar código arbitrario o causar una denegación de servicio (corrupción de memoria) a través de un sitio web manipulado, también conocido como 'vulnerabilidad de la corrupción de memoria de Internet Explorer,' una vulnerabilidad diferente a CVE-2015-1625. • http://www.securityfocus.com/bid/72931 http://www.securitytracker.com/id/1031888 https://docs.microsoft.com/en-us/security-updates/securitybulletins/2015/ms15-018 • CWE-399: Resource Management Errors •